CN100585555C - Method for identifying and removing potentially unwanted software - Google Patents
Method for identifying and removing potentially unwanted software Download PDFInfo
- Publication number
- CN100585555C CN100585555C CN200610051556A CN200610051556A CN100585555C CN 100585555 C CN100585555 C CN 100585555C CN 200610051556 A CN200610051556 A CN 200610051556A CN 200610051556 A CN200610051556 A CN 200610051556A CN 100585555 C CN100585555 C CN 100585555C
- Authority
- CN
- China
- Prior art keywords
- unwanted
- potentially
- program
- user
- software
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Stored Programmes (AREA)
- User Interface Of Digital Computer (AREA)
- Storage Device Security (AREA)
- Debugging And Monitoring (AREA)
Abstract
一种用于标识和移去潜在地不需要的程序的方法。提供了一种向用户标识可疑程序并允许用户阻止可疑程序运行而不实际移去它们的机制。在一个实施例中,在GUI上显示标识潜在地不需要的程序的扫描程序数据,允许用户禁止其继续的执行。例如,不在已知的、良性的应用程序/进程列表上的任何软件可被标识为潜在地不需要的。类似地,显示一个或多个可疑行为的软件也可被如此标识,从而允许用户在正常和可疑软件之间进行区分,而不会不可逆地改变用户系统。
A method for identifying and removing potentially unwanted programs. Provides a mechanism that identifies suspicious programs to the user and allows the user to prevent suspicious programs from running without actually removing them. In one embodiment, scanning program data identifying potentially unwanted programs is displayed on the GUI, allowing the user to disable their continued execution. For example, any software that is not on the list of known, benign applications/processes may be identified as potentially unwanted. Similarly, software that exhibits one or more suspicious behaviors can be identified as such, allowing a user to distinguish between normal and suspicious software without irreversibly altering the user's system.
Description
Claims (19)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/092,995 | 2005-03-28 | ||
| US11/092,995 US7685149B2 (en) | 2005-03-28 | 2005-03-28 | Identifying and removing potentially unwanted software |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN1841319A CN1841319A (en) | 2006-10-04 |
| CN100585555C true CN100585555C (en) | 2010-01-27 |
Family
ID=36407987
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN200610051556A Expired - Fee Related CN100585555C (en) | 2005-03-28 | 2006-02-28 | Method for identifying and removing potentially unwanted software |
Country Status (10)
| Country | Link |
|---|---|
| US (1) | US7685149B2 (en) |
| EP (1) | EP1708115A1 (en) |
| JP (1) | JP4936762B2 (en) |
| KR (1) | KR101224793B1 (en) |
| CN (1) | CN100585555C (en) |
| AU (1) | AU2006200384A1 (en) |
| BR (1) | BRPI0600631A (en) |
| CA (1) | CA2534728A1 (en) |
| MX (1) | MXPA06002337A (en) |
| RU (1) | RU2006105532A (en) |
Families Citing this family (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8572381B1 (en) * | 2006-02-06 | 2013-10-29 | Cisco Technology, Inc. | Challenge protected user queries |
| US20070258469A1 (en) * | 2006-05-05 | 2007-11-08 | Broadcom Corporation, A California Corporation | Switching network employing adware quarantine techniques |
| EP1916596A1 (en) * | 2006-10-26 | 2008-04-30 | Hewlett-Packard Development Company, L.P. | Improvements in or relating computer network management |
| KR100907453B1 (en) * | 2006-12-27 | 2009-07-10 | 주식회사 안철수연구소 | Software management method and system based on user evaluation |
| US20110185353A1 (en) * | 2010-01-27 | 2011-07-28 | Jack Matthew | Mitigating Problems Arising From Incompatible Software |
| WO2011119137A1 (en) | 2010-03-22 | 2011-09-29 | Lrdc Systems, Llc | A method of identifying and protecting the integrity of a set of source data |
| CN103685150B (en) * | 2012-09-03 | 2015-08-12 | 腾讯科技(深圳)有限公司 | The method and apparatus of upload file |
| US10089095B2 (en) * | 2015-05-06 | 2018-10-02 | Mcafee, Llc | Alerting the presence of bundled software during an installation |
| US10027692B2 (en) * | 2016-01-05 | 2018-07-17 | International Business Machines Corporation | Modifying evasive code using correlation analysis |
| US11936662B2 (en) * | 2020-08-26 | 2024-03-19 | Avanan Inc. | Unified security report and interface with multiple security layers |
| US11831729B2 (en) * | 2021-03-19 | 2023-11-28 | Servicenow, Inc. | Determining application security and correctness using machine learning based clustering and similarity |
Family Cites Families (39)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH03233629A (en) * | 1990-02-09 | 1991-10-17 | Nec Corp | System for checking destruction of execution format file |
| US7281268B2 (en) * | 1999-11-14 | 2007-10-09 | Mcafee, Inc. | System, method and computer program product for detection of unwanted processes |
| US20040034794A1 (en) * | 2000-05-28 | 2004-02-19 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
| US7350204B2 (en) | 2000-07-24 | 2008-03-25 | Microsoft Corporation | Policies for secure software execution |
| US7263616B1 (en) * | 2000-09-22 | 2007-08-28 | Ge Medical Systems Global Technology Company, Llc | Ultrasound imaging system having computer virus protection |
| US20030037138A1 (en) * | 2001-08-16 | 2003-02-20 | International Business Machines Corporation | Method, apparatus, and program for identifying, restricting, and monitoring data sent from client computers |
| US7509679B2 (en) * | 2002-08-30 | 2009-03-24 | Symantec Corporation | Method, system and computer program product for security in a global computer network transaction |
| US20040255137A1 (en) * | 2003-01-09 | 2004-12-16 | Shuqian Ying | Defending the name space |
| KR20040065674A (en) * | 2003-01-15 | 2004-07-23 | 권창훈 | Host-based security system and method |
| JP3835421B2 (en) * | 2003-03-28 | 2006-10-18 | コニカミノルタビジネステクノロジーズ株式会社 | Control program and control device |
| CA2464788A1 (en) * | 2003-04-16 | 2004-10-16 | Wms Gaming Inc. | A gaming software distribution network in a gaming system environment |
| CA2472366A1 (en) * | 2003-05-17 | 2004-11-17 | Microsoft Corporation | Mechanism for evaluating security risks |
| JP3971353B2 (en) * | 2003-07-03 | 2007-09-05 | 富士通株式会社 | Virus isolation system |
| WO2005020002A2 (en) * | 2003-08-15 | 2005-03-03 | Fiberlink Communications Corporation | System, method, apparatus and computer program product for facilitating digital communications |
| US20050144241A1 (en) * | 2003-10-17 | 2005-06-30 | Stata Raymond P. | Systems and methods for a search-based email client |
| US7536421B2 (en) * | 2003-10-31 | 2009-05-19 | Landmark Technology Partners, Inc. | Intelligent client architecture computer system and method |
| US7467409B2 (en) * | 2003-12-12 | 2008-12-16 | Microsoft Corporation | Aggregating trust services for file transfer clients |
| US7765592B2 (en) * | 2004-01-10 | 2010-07-27 | Microsoft Corporation | Changed file identification, software conflict resolution and unwanted file removal |
| WO2005099340A2 (en) | 2004-04-19 | 2005-10-27 | Securewave S.A. | On-line centralized and local authorization of executable files |
| US20070067297A1 (en) * | 2004-04-30 | 2007-03-22 | Kublickis Peter J | System and methods for a micropayment-enabled marketplace with permission-based, self-service, precision-targeted delivery of advertising, entertainment and informational content and relationship marketing to anonymous internet users |
| US20050268112A1 (en) * | 2004-05-28 | 2005-12-01 | Microsoft Corporation | Managing spyware and unwanted software through auto-start extensibility points |
| US7660999B2 (en) * | 2004-06-22 | 2010-02-09 | Microsoft Corporation | MIME handling security enforcement |
| US7962449B2 (en) * | 2004-06-25 | 2011-06-14 | Apple Inc. | Trusted index structure in a network environment |
| US7441273B2 (en) * | 2004-09-27 | 2008-10-21 | Mcafee, Inc. | Virus scanner system and method with integrated spyware detection capabilities |
| US7480683B2 (en) * | 2004-10-01 | 2009-01-20 | Webroot Software, Inc. | System and method for heuristic analysis to identify pestware |
| US20060167886A1 (en) * | 2004-11-22 | 2006-07-27 | International Business Machines Corporation | System and method for transmitting data from a storage medium to a user-defined cluster of local and remote server blades |
| US7409719B2 (en) * | 2004-12-21 | 2008-08-05 | Microsoft Corporation | Computer security management, such as in a virtual machine or hardened operating system |
| US20060149845A1 (en) * | 2004-12-30 | 2006-07-06 | Xinnia Technology, Llc | Managed quality of service for users and applications over shared networks |
| US7565695B2 (en) * | 2005-04-12 | 2009-07-21 | Webroot Software, Inc. | System and method for directly accessing data from a data storage medium |
| US8438499B2 (en) * | 2005-05-03 | 2013-05-07 | Mcafee, Inc. | Indicating website reputations during user interactions |
| US20060253584A1 (en) * | 2005-05-03 | 2006-11-09 | Dixon Christopher J | Reputation of an entity associated with a content item |
| US20070006311A1 (en) * | 2005-06-29 | 2007-01-04 | Barton Kevin T | System and method for managing pestware |
| US7730040B2 (en) * | 2005-07-27 | 2010-06-01 | Microsoft Corporation | Feedback-driven malware detector |
| US9471925B2 (en) * | 2005-09-14 | 2016-10-18 | Millennial Media Llc | Increasing mobile interactivity |
| US20070239724A1 (en) * | 2005-09-14 | 2007-10-11 | Jorey Ramer | Mobile search services related to direct identifiers |
| US20070061242A1 (en) * | 2005-09-14 | 2007-03-15 | Jorey Ramer | Implicit searching for mobile content |
| US20070168354A1 (en) * | 2005-11-01 | 2007-07-19 | Jorey Ramer | Combined algorithmic and editorial-reviewed mobile content search results |
| WO2007134250A2 (en) * | 2006-05-12 | 2007-11-22 | Goldengate Software, Inc. | Method for forming homogeneous from heterogeneous data |
| US8646038B2 (en) * | 2006-09-15 | 2014-02-04 | Microsoft Corporation | Automated service for blocking malware hosts |
-
2005
- 2005-03-28 US US11/092,995 patent/US7685149B2/en active Active
-
2006
- 2006-01-30 AU AU2006200384A patent/AU2006200384A1/en not_active Abandoned
- 2006-02-01 CA CA002534728A patent/CA2534728A1/en not_active Abandoned
- 2006-02-06 KR KR1020060011043A patent/KR101224793B1/en not_active Expired - Fee Related
- 2006-02-22 RU RU2006105532/09A patent/RU2006105532A/en not_active Application Discontinuation
- 2006-02-23 BR BRPI0600631-0A patent/BRPI0600631A/en not_active IP Right Cessation
- 2006-02-28 MX MXPA06002337A patent/MXPA06002337A/en not_active Application Discontinuation
- 2006-02-28 CN CN200610051556A patent/CN100585555C/en not_active Expired - Fee Related
- 2006-03-22 EP EP06111545A patent/EP1708115A1/en not_active Ceased
- 2006-03-28 JP JP2006088388A patent/JP4936762B2/en not_active Expired - Fee Related
Non-Patent Citations (1)
| Title |
|---|
| How to use the Microsoft AntiSpyware Beta to remove Spyware. Microsoft. 2005 * |
Also Published As
| Publication number | Publication date |
|---|---|
| AU2006200384A1 (en) | 2006-10-12 |
| CA2534728A1 (en) | 2006-09-28 |
| CN1841319A (en) | 2006-10-04 |
| KR20060103826A (en) | 2006-10-04 |
| US7685149B2 (en) | 2010-03-23 |
| JP2006277747A (en) | 2006-10-12 |
| BRPI0600631A (en) | 2006-11-28 |
| JP4936762B2 (en) | 2012-05-23 |
| US20060218145A1 (en) | 2006-09-28 |
| MXPA06002337A (en) | 2006-09-27 |
| KR101224793B1 (en) | 2013-01-21 |
| RU2006105532A (en) | 2007-09-27 |
| EP1708115A1 (en) | 2006-10-04 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11516237B2 (en) | Visualization and control of remotely monitored hosts | |
| CN103065091B (en) | Reduce with malware detection expanding system | |
| US8230502B1 (en) | Push alert system, method, and computer program product | |
| CN100585555C (en) | Method for identifying and removing potentially unwanted software | |
| US10853487B2 (en) | Path-based program lineage inference analysis | |
| EP3772004B1 (en) | Malicious incident visualization | |
| US20130160126A1 (en) | Malware remediation system and method for modern applications | |
| WO2021126747A1 (en) | Method for detecting and defeating ransomware | |
| US9424422B2 (en) | Detection of rogue software applications | |
| US9152791B1 (en) | Removal of fake anti-virus software | |
| US20160036834A1 (en) | System and method for determining category of trustof applications performing interface overlay | |
| EP3531327B1 (en) | Cross machine detection techniques | |
| TWI528216B (en) | Method, electronic device, and user interface for on-demand detecting malware | |
| US12255905B2 (en) | Machine learning malware classifications using behavioral artifacts | |
| Chiasson et al. | Even experts deserve usable security: Design guidelines for security management systems | |
| CN104050417A (en) | Method and device for detecting software states at mobile terminal | |
| Fassl et al. | Comparing User Perceptions of {Anti-Stalkerware} Apps with the Technical Reality | |
| Heartfield et al. | Protection against semantic social engineering attacks | |
| US9825986B1 (en) | Systems and methods for generating contextually meaningful animated visualizations of computer security events | |
| CN111880884A (en) | Alarm display system and display method | |
| WO2008036665A2 (en) | Methods, media, and systems for detecting attack on a digital processing device | |
| US20190268362A1 (en) | Methods and systems for cyber-monitoring and visually depicting cyber-activities | |
| US20240248986A1 (en) | Determination method, determination device, and determination program | |
| US20130276104A1 (en) | System, method and computer program product for displaying security actions for undo purposes | |
| RU2580053C2 (en) | System and method of determining unknown status application |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| ASS | Succession or assignment of patent right |
Owner name: MICROSOFT TECHNOLOGY LICENSING LLC Free format text: FORMER OWNER: MICROSOFT CORP. Effective date: 20150429 |
|
| C41 | Transfer of patent application or patent right or utility model | ||
| TR01 | Transfer of patent right |
Effective date of registration: 20150429 Address after: Washington State Patentee after: MICROSOFT TECHNOLOGY LICENSING, LLC Address before: Washington State Patentee before: Microsoft Corp. |
|
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20100127 |
|
| CF01 | Termination of patent right due to non-payment of annual fee |
